Smurf attack (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Smurf attack" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
5th place
5th place
11th place
8th place
214th place
176th place
low place
low place
low place
low place
low place
low place
1st place
1st place
652nd place
515th place
low place
low place
2,882nd place
2,105th place
low place
low place
3rd place
3rd place

books.google.com

cisco.com

cloudns.net

doi.org

  • Sun, Fei Xian (2011). "Danger Theory Based Risk Evaluation Model for Smurf Attacks". Key Engineering Materials. 467–469: 515–521. doi:10.4028/www.scientific.net/KEM.467-469.515. ISSN 1662-9795. S2CID 110045205.
  • S. Kumar (5 July 2007). Kumar, Sanjeev (2007). "Smurf-based Distributed Denial of Service (DDoS) Attack Amplification in Internet". Second International Conference on Internet Monitoring and Protection (ICIMP 2007). p. 25. doi:10.1109/ICIMP.2007.42. ISBN 978-0-7695-2911-0. S2CID 14876546. Retrieved 2020-12-30. {{cite book}}: |website= ignored (help)
  • D. Senie (August 1999). Changing the Default for Directed Broadcasts in Routers. Network Working Group. doi:10.17487/RFC2644. BCP 34. RFC 2644. Best Common Practice. Updates RFC 1812.
  • Ferguson, P.; Senie, D. (May 2000). Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. IETF. doi:10.17487/RFC2827. BCP 38. RFC 2827. Best Common Practice.

hackepedia.org

  • "Tfreak". Hackepedia. 2013-03-28. Retrieved 2019-11-13.

ieee.org

ieeexplore.ieee.org

ietf.org

datatracker.ietf.org

multitechpublisher.com

journal.multitechpublisher.com

radware.com

security.radware.com

scientific.net

  • Sun, Fei Xian (2011). "Danger Theory Based Risk Evaluation Model for Smurf Attacks". Key Engineering Materials. 467–469: 515–521. doi:10.4028/www.scientific.net/KEM.467-469.515. ISSN 1662-9795. S2CID 110045205.

semanticscholar.org

api.semanticscholar.org

  • Sun, Fei Xian (2011). "Danger Theory Based Risk Evaluation Model for Smurf Attacks". Key Engineering Materials. 467–469: 515–521. doi:10.4028/www.scientific.net/KEM.467-469.515. ISSN 1662-9795. S2CID 110045205.
  • S. Kumar (5 July 2007). Kumar, Sanjeev (2007). "Smurf-based Distributed Denial of Service (DDoS) Attack Amplification in Internet". Second International Conference on Internet Monitoring and Protection (ICIMP 2007). p. 25. doi:10.1109/ICIMP.2007.42. ISBN 978-0-7695-2911-0. S2CID 14876546. Retrieved 2020-12-30. {{cite book}}: |website= ignored (help)

web.archive.org

worldcat.org

search.worldcat.org

  • Sun, Fei Xian (2011). "Danger Theory Based Risk Evaluation Model for Smurf Attacks". Key Engineering Materials. 467–469: 515–521. doi:10.4028/www.scientific.net/KEM.467-469.515. ISSN 1662-9795. S2CID 110045205.
  • Hartanto, Sri (2023-07-30). "The Impact of Smurf Attack on Web Server in Communication Network and its Preventions". International Journal of Sustainable Applied Sciences (IJSAS). 1 (1). Sri Hartanto: 35–46. ISSN 3025-5597.